Cryptanalysis of Full Sprout
From MaRDI portal
Publication:3457133
DOI10.1007/978-3-662-47989-6_32zbMath1375.94142OpenAlexW2276318674MaRDI QIDQ3457133
Virginie Lallemand, María Naya-Plasencia
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_32
Related Items (7)
The parallel-cut meet-in-the-middle attack ⋮ Some results on lightweight stream ciphers Fountain v1 \& lizard ⋮ Some results on Fruit ⋮ Design and analysis of small-state grain-like stream ciphers ⋮ On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks ⋮ Efficient dissection of bicomposite problems with cryptanalytic applications ⋮ Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
Uses Software
Cites Work
- Sieve-in-the-Middle: Improved MITM Attacks
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- LBlock: A Lightweight Block Cipher
- Cryptanalysis of ARMADILLO2
- The LED Block Cipher
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- PRESENT: An Ultra-Lightweight Block Cipher
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Cube Attacks on Tweakable Black Box Polynomials
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Differential Analysis of the LED Block Cipher
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- How to Improve Rebound Attacks
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Hash Functions and RFID Tags: Mind the Gap
This page was built for publication: Cryptanalysis of Full Sprout